1.1 Reliability
Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if entered incorrectly or outdated. Ex. a medical record becomes dissociated from the patient it refers to becomes unreliable. The reliability of machines, software and data determines our confidence in their value.
1.2 Integrity
Integrity refers to correspondence of data with itself, at its creation. Data lacks integrity when it has been changed accidentally or tampered with. For example, a hacker might change driver licence data resulting in arrests of innocent people.
1.3 Security
Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society’s confidence in the information contained in the systems.
1.4 Privacy and anonymity
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity, which might be called for in some contexts but is dangerous in others. Ex. discussion of a delicate subject might require anonymity, or at least privacy. On the other hand, anonymity could also conceal the perpetrators of criminal, terrorist or computer hacking acts.
1.5 Authenticity
Authenticity means establishing the user’s identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentication is user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.
1.6 Intellectual property
Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyrights, trademarks and patents legally protect intellectual property, but easy and accurate duplication methods made available by IT can undermine such protections. On the other hand, the same methods create opportunity for inexpensive dissemination of information.
1.7 Equality of access
IT has the potential to offer universal access to information, regardless of distance, age, race, gender or other personal characteristics. However, the above characteristics, and cost, can also bar individuals or groups from access. Ex. while telelearning brings previously unavailable opportunities to everyone’s doorstep, the cost of hardware, software or course fees might place the learning beyond the reach of an average person.
1.8 Control
As an instrument of control, IT improves reliability, accuracy and speed of systems. However, it can also be used to control people. An automatic aircraft landing system provides an example of increased reliability resulting from IT control. Employer surveillance of employees represents a new kind of control imposed on people
1.9 Globalization and cultural diversity
Globalization means the diminishing importance of geographic, political, economic and cultural boundaries. IT has played a major role in reducing these boundaries. For example, any dramatic event anywhere in the world can be broadcast almost instantly by television or on the Internet. However, there is a fear that easier communication can become a source of cultural homogeneity. The new global village provides a worldwide cultural awareness, but may lead to less diversity.
1.10 Policies and standards Policies are enforceable measures intended to promote appropriate use. They can be developed by governments, businesses, and private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware and software. Ex. a national policy on IT security would need to define what constitutes unlawful access to networks and how to treat transgression. Policies also affect the exchange of information, for example, by making it subject to copyright laws. In general, policies can promote or restrict access, modify behaviour or require the fulfillment of certain conditions prior to or during use. Standards are social or technical rules and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components. They might govern the design and use of hardware, software and information. Ex. communication protocols used on the Internet, the ASCII representation for characters, or the design of the printer port on a PC are all governed by standards.
1.11 People and machines
The interaction of humans with IT hardware raises all the issues encountered in this section, as well as additional ones such as the following.
Who controls the design and tpace of its introduction?
How safe and effective is the design?
Is technology going to extend human faculties, or are machines going to displace humans and lead to mass unemployment?
Is technology used appropriately, or should a better, possibly non-technological alternative be found?
Which areas of human endeavour are best served by IT systems?
Which social and ethical issues arise from a comparison of people and machines in the following areas: stamina, memory, accuracy, speed, analysis, synthesis, judgment, innovation, creativity?
IT Systems
Hardware
System Fundamentals
Networks
Applications
Software Fundamentals
Databases & Spreadsheets
Word Processing & Desktop Publishing
Images, Sounds, & Presentations
Modeling & Simulations
Tutorials, Training, & Wizards
Communications
The Internet
Personal & Public Communications
Integrated Systems
Robotics
Artificial Intelligence & Expert Systems
Areas of Impact
Business & Employment
Transportation
Banking & Finance
International Commerce
E-commerce
Retail, Advertising, & Media
Arts, Entertainment, & Leisure
Digital Art
Films
Live Art
News Media
Broadcast Media
Toys & Games
Politics & Government
Political Process
Government
Legislation
Police
Military
Terrorism
Science & Environment
Modelling and simulation
Visualization
Data search, collection, processing and analysis
Forecasting
Data Logging
Health
Telemedicine
Electronic Health Records
Diagnostic & Theraputic Tools
Medical Advice on the Internet & CD-ROMs
Monitoring Patients
IT Solutions for Disabled People
Education
Telelearning
Modification of Hardware/Software for Special Needs
Software in the Classroom
School Library Systems
Hardware in the Classroom
Software in School Administration
Training, Tutorials, & Simulator
Command Terms
Identify
Recognize and state a fact or feature
[2 marks]
Compare
Describe two + situations - present similarities
[2 marks]
Contrast
Describe two + situations - present differences
[2 marks]
Define
Clear, precise meaning of term or concept
[2 marks]
Describe
Present characteristics of a topic
[2 marks]
Distinguish
Make clear differences between two concepts
[2 marks]
Explain
Describe, giving reasons
[3 marks]
Examine
Consider concepts that uncover assumptions and interrelationships
[4 marks]
Discuss
Offer a balanced view on a topic
Opinions/conclusions supported by evidence and sound argument
[5 marks]
Analyze
Break down in order
Essential elements
Structure
Assumptions and interrelationships
[6 marks]
Evaluate
Appraise situation by weighing up the strengths and limitations of evidence and argument
[8 marks]
To What Extent
Evaluate success or failure of an concept
State opinion and conclusion with evidence and argument
Social and Ethical Issues in ITGS
Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if entered incorrectly or outdated. Ex. a medical record becomes dissociated from the patient it refers to becomes unreliable. The reliability of machines, software and data determines our confidence in their value.
Integrity refers to correspondence of data with itself, at its creation. Data lacks integrity when it has been changed accidentally or tampered with. For example, a hacker might change driver licence data resulting in arrests of innocent people.
Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society’s confidence in the information contained in the systems.
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity, which might be called for in some contexts but is dangerous in others. Ex. discussion of a delicate subject might require anonymity, or at least privacy. On the other hand, anonymity could also conceal the perpetrators of criminal, terrorist or computer hacking acts.
Authenticity means establishing the user’s identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentication is user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.
Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyrights, trademarks and patents legally protect intellectual property, but easy and accurate duplication methods made available by IT can undermine such protections. On the other hand, the same methods create opportunity for inexpensive dissemination of information.
IT has the potential to offer universal access to information, regardless of distance, age, race, gender or other personal characteristics. However, the above characteristics, and cost, can also bar individuals or groups from access. Ex. while telelearning brings previously unavailable opportunities to everyone’s doorstep, the cost of hardware, software or course fees might place the learning beyond the reach of an average person.
As an instrument of control, IT improves reliability, accuracy and speed of systems. However, it can also be used to control people. An automatic aircraft landing system provides an example of increased reliability resulting from IT control. Employer surveillance of employees represents a new kind of control imposed on people
Globalization means the diminishing importance of geographic, political, economic and cultural boundaries. IT has played a major role in reducing these boundaries. For example, any dramatic event anywhere in the world can be broadcast almost instantly by television or on the Internet. However, there is a fear that easier communication can become a source of cultural homogeneity. The new global village provides a worldwide cultural awareness, but may lead to less diversity.
The interaction of humans with IT hardware raises all the issues encountered in this section, as well as additional ones such as the following.
IT Systems
- System Fundamentals
NetworksAreas of Impact
Command Terms